Keyword: usoj_dload.qyua
419 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan executes the file ipconfig.exe . If unsuccessful, it will terminate itself. It has a routine that adds garbage data to the resource section of its dropped files, making their sizes vary.
This malware is an infection vector related to a vulnerability which is triggered when Windows Multimedia Library in Windows Media Player (WMP) fails to handle a specially crafted MIDI file,
This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the following malware: TROJ_DLOAD.QYUA Autostart Technique This Trojan registers itself as a system service
This spyware monitors an infected user's browser for a list of Korean gaming sites and steals sensitive user login information. To get a one-glance comprehensive view of the behavior of this Spyware,
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. It may be downloaded from
This Trojan executes when a user accesses certain websites where it is hosted. Arrival Details This Trojan executes when a user accesses certain websites where it is hosted. It may be downloaded from
This HTML script malware connects to certain websites in order to remotely execute a file that Trend Micro detects as JAVA_DLOAD.HBM. As a result, the malicious routines of this Java applet malware
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan may be dropped by other malware. It arrives as a component bundled with malware/grayware/spyware packages. Arrival Details This Trojan may be dropped by other malware. It arrives as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
It may be dropped by other malware. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. Arrival Details It may be dropped
This Trojan arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run when a user accesses the said website. It executes the downloaded files. As a result,
This Trojan may arrive as a file that exports functions used by other malware. It may be dropped by other malware. It is injected into all running processes to remain memory resident. However, as of
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. As of this writing,
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It uses common file icons to trick a user into thinking that the files are legitimate. Arrival Details This
This Trojan may be downloaded by other malware/grayware from remote sites. Arrival Details This Trojan may be downloaded by the following malware/grayware from remote sites: JAVA_BLACOLE.BXE It may
This Trojan executes when a user accesses certain websites where it is hosted. It does not have any propagation routine. It does not have any backdoor routine. It does not drop any other file. It
This Trojan may be hosted on a website and run when a user accesses the said website. This is the Trend Micro detection for files that exhibit certain behaviors. Arrival Details This Trojan may be
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It is a component of other malware. It requires its main